Filtered by vendor Prestashop
Subscriptions
Total
122 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-45448 | 1 Prestashop | 1 M4 Pdf | 2024-11-21 | 3.5 Low |
M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to an arbitrary HTML Document crafting vulnerability. The resource /m4pdf/pdf.php uses templates to dynamically create documents. In the case that the template does not exist, the application will return a fixed document with a message in mpdf format. An attacker could exploit this vulnerability by inputting a valid HTML/CSS document as the value of the parameter. | ||||
CVE-2022-45447 | 1 Prestashop | 1 M4 Pdf | 2024-11-21 | 6.5 Medium |
M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to a directory traversal vulnerability. The âfâ parameter is not properly checked in the resource /m4pdf/pdf.php, returning any file given its relative path. An attacker that exploits this vulnerability could download /etc/passwd from the server if the file exists. | ||||
CVE-2022-35933 | 1 Prestashop | 1 Productcomments | 2024-11-21 | 6.1 Medium |
This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator's cookie. The issue is fixed in version 5.0.2. | ||||
CVE-2022-31181 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 9.8 Critical |
PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature. | ||||
CVE-2022-31101 | 1 Prestashop | 1 Blockwishlist | 2024-11-21 | 8.1 High |
prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue. | ||||
CVE-2022-21686 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 9 Critical |
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds. | ||||
CVE-2021-43789 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 7.5 High |
PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2. | ||||
CVE-2021-3110 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 9.8 Critical |
The store system in PrestaShop 1.7.7.0 allows time-based boolean SQL injection via the module=productcomments controller=CommentGrade id_products[] parameter. | ||||
CVE-2021-21418 | 1 Prestashop | 1 Ps Emailsubscription | 2024-11-21 | 4.6 Medium |
ps_emailsubscription is a newsletter subscription module for the PrestaShop platform. An employee can inject javascript in the newsletter condition field that will then be executed on the front office The issue has been fixed in 2.6.1 | ||||
CVE-2021-21398 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 5.4 Medium |
PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.7.3, an attacker can inject HTML when the Grid Column Type DataColumn is badly used. The problem is fixed in 1.7.7.3 | ||||
CVE-2021-21308 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.1 Medium |
PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 the soft logout system is not complete and an attacker is able to foreign request and executes customer commands. The problem is fixed in 1.7.7.2 | ||||
CVE-2021-21302 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.8 Medium |
PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 there is a CSV Injection vulnerability possible by using shop search keywords via the admin panel. The problem is fixed in 1.7.7.2 | ||||
CVE-2020-6632 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.1 Medium |
In PrestaShop 1.7.6.2, XSS can occur during addition or removal of a QuickAccess link. This is related to AdminQuickAccessesController.php, themes/default/template/header.tpl, and themes/new-theme/js/header.js. | ||||
CVE-2020-5294 | 1 Prestashop | 1 Prestashop Socialfollow | 2024-11-21 | 4.1 Medium |
PrestaShop module ps_facetedsearch versions before 2.1.0 has a reflected XSS with social networks fields The problem is fixed in 2.1.0 | ||||
CVE-2020-5293 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 6.5 Medium |
In PrestaShop between versions 1.7.0.0 and 1.7.6.5, there are improper access controls on product page with combinations, attachments and specific prices. The problem is fixed in 1.7.6.5. | ||||
CVE-2020-5288 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 4.1 Medium |
"In PrestaShop between versions 1.7.0.0 and 1.7.6.5, there is improper access controls on product attributes page. The problem is fixed in 1.7.6.5. | ||||
CVE-2020-5287 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 4.1 Medium |
In PrestaShop between versions 1.5.5.0 and 1.7.6.5, there is improper access control on customers search. The problem is fixed in 1.7.6.5. | ||||
CVE-2020-5286 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 4.1 Medium |
In PrestaShop between versions 1.7.4.0 and 1.7.6.5, there is a reflected XSS when uploading a wrong file. The problem is fixed in 1.7.6.5 | ||||
CVE-2020-5285 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 4.1 Medium |
In PrestaShop between versions 1.7.6.0 and 1.7.6.5, there is a reflected XSS with `back` parameter. The problem is fixed in 1.7.6.5 | ||||
CVE-2020-5279 | 1 Prestashop | 1 Prestashop | 2024-11-21 | 4.1 Medium |
In PrestaShop between versions 1.5.0.0 and 1.7.6.5, there are improper access control since the the version 1.5.0.0 for legacy controllers. - admin-dev/index.php/configure/shop/customer-preferences/ - admin-dev/index.php/improve/international/translations/ - admin-dev/index.php/improve/international/geolocation/ - admin-dev/index.php/improve/international/localization - admin-dev/index.php/configure/advanced/performance - admin-dev/index.php/sell/orders/delivery-slips/ - admin-dev/index.php?controller=AdminStatuses The problem is fixed in 1.7.6.5 |